ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 111 - Professional Cloud DevOps Engineer discussion

Report
Export

Your company is using HTTPS requests to trigger a public Cloud Run-hosted service accessible at the https://booking-engine-abcdef .a.run.app URL You need to give developers the ability to test the latest revisions of the service before the service is exposed to customers What should you do?

A.
Runthegcioud run deploy booking-engine ---no-traffic ----ag dev command Use the https://dev----booking-engine-abcdef. a. run. app URL for testing
Answers
A.
Runthegcioud run deploy booking-engine ---no-traffic ----ag dev command Use the https://dev----booking-engine-abcdef. a. run. app URL for testing
B.
Runthegcioud run services update-traffic booking-engine ---to-revisions LATEST*! command Use the ht tps: //booking-engine-abcdef. a. run. ape URL for testing
Answers
B.
Runthegcioud run services update-traffic booking-engine ---to-revisions LATEST*! command Use the ht tps: //booking-engine-abcdef. a. run. ape URL for testing
C.
Pass the curl -K 'Authorization: Hearer S(gclcud auth print-identity-token)' auth token Use the https: / /booking-engine-abcdef. a. run. app URL to test privately
Answers
C.
Pass the curl -K 'Authorization: Hearer S(gclcud auth print-identity-token)' auth token Use the https: / /booking-engine-abcdef. a. run. app URL to test privately
D.
Grant the roles/run. invoker role to the developers testing the booking-engine service Use the https: //booking-engine-abcdef. private. run. app URL for testing
Answers
D.
Grant the roles/run. invoker role to the developers testing the booking-engine service Use the https: //booking-engine-abcdef. private. run. app URL for testing
Suggested answer: B

Explanation:

The best option for securing the CI/CD deployment pipeline is to configure vulnerability analysis with Artifact Registry and Binary Authorization. Vulnerability analysis is a feature that allows you to scan container images for known vulnerabilities and security issues. You can use vulnerability analysis with Artifact Registry, which is a service that allows you to store and manage container images and other artifacts. By using vulnerability analysis with Artifact Registry, you can ensure that your container images are scanned for vulnerabilities before they are deployed. Binary Authorization is a feature that allows you to enforce signature-based validation when deploying container images. You can use Binary Authorization with Cloud Build, which is a service that allows you to build and deploy container images. By using Binary Authorization with Cloud Build, you can ensure that only authorized and verified container images are deployed to your environment.

asked 18/09/2024
Bipindra Shrestha
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first